Thu, May 18
9:00 AM – 10:00 AM ET
9:00 AM – 10:00 AM ET
The Role of Generative AI in Manufacturing:
A Discussion of Current and Future Applications
This session will explore the current and potential future applications of generative AI in manufacturing. The discussion will focus on how generative AI can be used to optimize manufacturing processes, improve product design, and increase overall efficiency. Experts in the field will share their insights and experiences, and attendees will have the opportunity to participate in a Q&A to gain a deeper understanding of how generative AI can transform the manufacturing industry.
Thu, May 18
10:00 AM – 11:00 AM ET
10:00 AM – 11:00 AM ET
How to improve Overall Equipment Effectiveness using IIoT technologies (sponsored by IFM, Pulse Industrial and Empiric Inc.)
This session will explore the use of Industrial Internet of Things (IIoT) technologies to improve Overall Equipment Effectiveness (OEE) in manufacturing. Our speakers will discuss how IIoT sensors, analytics, and machine learning algorithms can be used to collect and analyze data on equipment performance in real time. This data can then be used to identify areas of improvement in the manufacturing process, such as reducing downtime, optimizing maintenance schedules, and improving product quality.
The speakers will also focus on the emergence of IIOT as a business case; the role of technology supporting plug-and-play IIOT; the Challenges and limitations of plug-and-play IIOT; Insights for the future of IIOT.
Keynote Session
Thu, May 18
11:00 AM – 11:30 AM ET
11:00 AM – 11:30 AM ET
Making Cyberspace Safe and Secure by Design (sponsored by IIoT World)
Within the recently released National Cybersecurity Strategy, the White House is advancing cybersecurity efforts spanning national security systems and critical infrastructure to everyday consumer IoT products. Now that the strategy is in place, what are the tangible next steps to reduce risk? Our speakers will frame these efforts in the context of the current threatscape, geopolitics, and Administration policy toward a cyberspace that is safe and secure by design.
Special Assistant to the President and Senior Director for Cybersecurity and Emerging Technology,
National Security Council
National Security Council
Thu, May 18
11:30 AM – 12:30 PM ET
11:30 AM – 12:30 PM ET
Top best practices for Zero Trust OT Security (sponsored by TXOne)
This session will focus on the best practices for implementing Zero Trust security in operational technology (OT) environments. Speakers will discuss various techniques that can be used to achieve Zero Trust, such as network segmentation, continuous monitoring, identity and access management, and endpoint protection.
In addition, the session will draw on the experience of industry experts who have successfully implemented Zero Trust security measures in OT environments.
In addition, the session will draw on the experience of industry experts who have successfully implemented Zero Trust security measures in OT environments.
Thu, May 18
12:30 PM – 1:30 PM ET
12:30 PM – 1:30 PM ET